Overall Questions (15 random)

You got 12 of 15 possible points.
Your score was: 80 %

Question Results

Score 0 of 1

Question:

Clark-Wilson focuses primarily on:

Response:

Confidentialty

Authentication

Accessibility

Address Integrity

Availability

Score 1 of 1

Question:

What OSI Layer includes data encryption?

Response:

Application

Presentation

Network

Datalink

Transport

Score 0 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

EAP

LDAP

CHAP

PAP

Score 1 of 1

Question:

Which of the following is primarily focused on identifying violations and incidents?

Response:

Compensating

Recovery

Detective

Preventative

Corrective

Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Corrective

correct

Intended to bring the environment back to production levels

Recovery

correct

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 0 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Physical controls

Administrative controls

Both technical and administrative controls

Technical controls

Score 1 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

ATM

SMDS

Frame Relay

SONET

MPLS

Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Mandatory access control

Need-to-Know control

Access List Control

Role-based access control

Owner set access control

Score 1 of 1

Question:

Which access control includes locked doors?

Response:

Technical

Physical

Organizational

Owner

Administrative

Score 1 of 1

Question:

Which of the following is a remote authentication system?

Response:

SESAME

KERBEROS

TACACS

OpenVPN

Score 1 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Vulnerability

correct

A virus that relies on unpatched code or OS levels

Threat

correct

The likelihood a threat will be realized, the frequency of natural disasters

Risk

correct

$1M dollars per day downtime

Risk

incorrect

A proxy server

Countermeasure

correct
Score 1 of 1

Question:

How many levels are there in the latest (June 2013) OSI model?

Response:

6

5

7

10

8

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Administrative controls

Both Technical and Administrative controls

Technical controls

Physical controls

Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Corrective

Detective

Preventative

Deterrent

Recovery

Score 1 of 1

Question:

Which access control includes training?

Response:

Physical

Technical

Organizational

Administrative